matricali / brutekragView external linksLinks
Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
☆32Oct 15, 2019Updated 6 years ago
Alternatives and similar repositories for brutekrag
Users that are interested in brutekrag are comparing it to the libraries listed below
Sorting:
- Simple SOCKS5 Server. Written in C.☆10Dec 27, 2019Updated 6 years ago
- Web-based shell written in PHP☆12Aug 27, 2018Updated 7 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.☆175Aug 16, 2024Updated last year
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- Tool to perform Brute Force Attack FTP☆11Jan 23, 2020Updated 6 years ago
- Firefox User Guide☆15Jun 14, 2025Updated 8 months ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- This is the OFFICIAL CybernetiX S3C website.☆21Feb 4, 2026Updated last week
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 5 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Feb 14, 2020Updated 5 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆30Mar 22, 2023Updated 2 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Mar 5, 2021Updated 4 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- ViewState Payload Generator☆27Aug 17, 2018Updated 7 years ago
- A nefarious keylogger for Ubuntu. Encrypts keylogs and uploads to pastebin.☆27May 1, 2017Updated 8 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆28May 19, 2018Updated 7 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- A Linux RAT in C☆33Oct 29, 2018Updated 7 years ago
- ☆11Feb 22, 2023Updated 2 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- A python based DOS/DDOS test tool☆14Mar 17, 2020Updated 5 years ago
- Find exploitable PHP files by parameter fuzzing and function call tracing☆72Jan 24, 2017Updated 9 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Simple detector of ARP poisoning attack☆29Apr 23, 2015Updated 10 years ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago